Advisory
Title: Web Browsers vulnerable to the Extended HTML
Form Attack
Release Date: 06/02/2002
Effects:
Internet Explorer 6 and older versions
Opera 6.0 and older versions
Severity:
Allows stealing of cookies, penetration of internal
networks and other evil stuff.
Author:
Obscure^
[ obscure@eyeonsecurity.org
]
Vendor Status:
Internet Explorer - Informed secure@microsoft.com
and worked with them to release a patch. Should
be out soon.
Opera - Worked with the Opera team. A fix is due
next release.
Web:
https://www.eyeonsecurity.org/papers/
- Extended HTML Form Attack
Background.
Many web browsers such as Internet
Explorer allow forms to be submitted to non-HTTP
services. Some non-HTTP
services echo back the information sent, and the
web browser renders the echo as an HTML page,
regardless
of the protocol behind the service.
Problem.
A malicious user can create a
form which is submitted by the victim (automatically
using Active Scripting
or manually using Social Engineering). This form
can cause a non-HTTP service to echo back JavaScript
commands
which in turn allow the malicious user to steal
the cookie for that domain.
There are more uses for this attack, other than
just stealing cookies.
Exploit Example.
demo at https://www.eyeonsecurity.org/advisories/extended-form-attack/demoes
Disclaimer.
The information within this document
may change without notice. Use of
this information constitutes acceptance for use
in an AS IS
condition. There are NO warranties with regard
to this information.
In no event shall the author be liable for any
consequences whatsoever
arising out of or in connection with the use or
spread of this
information. Any use of this information lays
within the user's
responsibility.
Feedback.
Please send suggestions, updates,
and comments to:
Eye on Security
mail : obscure@eyeonsecurity.org
web : http://www.eyeonsecurity.org
|